In this blog post, I’ll be sharing my insights and experiences on the RISCoT project, including the developments and achievements we’ve made along the way.
A blog about IT, security and whatever crosses my mind
In this blog post, I’ll be sharing my insights and experiences on the RISCoT project, including the developments and achievements we’ve made along the way.
I made a two-week trip to Japan, and it was totally unexpected and a wild ride.
Every two years there is a “long night of science” in my region, which is a local event that allows researchers, companies, and other to present something to the public.…
Recently I had the opportunity to participate in a documentary about ransomware. The journalist that conducted the interview (not with me unfortunately) wanted to see how malware in general works…
This post is inspired by a lot of questions I get about emails: Hey I got this strange email the other day… There are different mails that the security community…
For my research I had a look at new functionalities of Android, especially related to security. I came across Protected Confirmation, which is a rather interesting method to ask the…
Last week I saw this tweet, which sparked a lot of interesting discussion about security of compilers.
I have been learning and practicing “hacking” for years now. In the last year, I conducted an experiment as part of my master’s thesis and wanted to explore how servers…
WordPress is a rather popular publishing software, and as such, it is an attractive target for attackers. A lot of websites use it, lots of websites do not have the…
WordPress is a widely used software for websites, blogs and landing pages. The setup of WordPress is pretty easy and straight-forward even for non-technical users, and users can host their…